He is BobH, Finance Employee.
Violated the Office Policy
-
By falsifying and manipulating official records.
Caught by the Administration…
Filled with Rages.
-
Got anger.
-
Planned to sabatoge the Management.
Installing a WiFi AP near the office…
-
That has same SSID and Credentials as office device.
If anyone get Connect,He got Access..
Accessing Entire Network.
-
Even can control entire network.
Disclaimer
-
Educational Purpose only.
-
Please don’t use it anywhere.
Rogue AP attack
-
A type of Social Engineering.
-
Actions may involve planting unauthorized device inside the secured network.
-
Devices such as switches, Routers, WiFi AP.
-
It is rarely Noticable. So, Normal people can’t realize even if they used for this attack.
-
Like BobH did, Anyone can do this attack with ease.
-
In addition to that, Ther are many tools available for free.
-
Also, Some deploy ready equipments available online such as WiFi Pineapple
-
Evil-Twin Framework for Red Team
-
OpenSource
-
Written in python.
-
Used for WiFi Pentesting.
-
Able to to Packet sniffing (scapy), Packet injection, and Twin AP creation.
-
It is so popular, that Rogue AP attack often refered as Evil-Twin Attack.
-
Snort 3 for Blue Team.
-
Opensource Intrution Prevention Software.
-
uses a series of rules that help define malicious network activity and Stop those packets.
-
Capable of real-time traffic analysis and packet logging.
Precaution & Safety
-
Say “no” to public Wi-Fi.
-
Use VPN over a public Wi-Fi.
-
Encourage use of properly installed, configured and secured wireless LANs only.
-
Good think is some new device can tell apart Evil-Twins.